Air Live WL-5460AP User`s manual

WL-5460AP v2
802.11g Multi-function
Wireless Access Point
User’s Manual
1
WL5460AP v2 User’s Manual
Declaration of Conformity
We, Manufacturer/Importer
OvisLink Corp.
5F., NO.6, Lane 130, Min-Chuan Rd.,
Hsin-Tien City, Taipei County, Taiwan
Declare that the product
802.11g Multi-function Wireless Access Point
WL-5460AP , WL-5450AP
is in conformity with
In accordance with 89/336 EEC-EMC Directive and 1999/5 EC-R & TTE Directive
Clause
Description
■ EN
Electromagnetic compatibility and Radio spectrum Matters (ERM);
Wideband transmission equipment operating in the 2.4GHz ISM band
And using spread spectrum modulation techniques; Part 1：technical
Characteristics and test conditions Part2：Harmonized EN covering
Essential requirements under article 3.2 of the R&TTE Directive
■ EN
301 489-1 V1.4.1
(2002-08)
■ EN 301 489-17 V1.2.1
(2002-08)
Electromagnetic compatibility and Radio spectrum Matters (ERM);
Electromagnetic compatibility(EMC) standard for radio equipment and
Services; Part 17：Specific conditions for wideband data and
HIPERLAN equipment
■ EN
Limits and methods of measurement of radio disturbance
characteristics of information technology equipment
■ EN
Information Technology equipment-Immunity characteristics-Limits and
Methods of measurement
■ EN 50385
Product standard to demonstrate the Compliance of radio base
stations and Fixed terminal stations for wireless Telecommunication
System with the Basic restrictions or the reference levels related to
human exposure to radio Frequency electromagnetic fields ( 110 MHz
– 40 GHz ) - General public
■ EN
Safety for information technology equipment including electrical
business equipment
300 328 V1.6.1
(2004-11)
55022: 1998/A1
:2000/A2:2003
55024:1998/A1
:2001/A2:2003
60950-1:2001/
A11:2004
■ CE
marking
Manufacturer/Importer
Signature：
Name
：
Position/ Title :
Albert Yeh
Vice President
Date： 2007/4/18
(Stamp)
WL-5450(5460)AP CE Declaration Statement
Country
Declaration
Country
Declaration
cs
OvisLink Corp. tímto prohlašuje, že tento
WL-5450(5460)AP je ve shodě se základními
požadavky a dalšími příslušnými ustanoveními
směrnice 1999/5/ES.
lt
iuo OvisLink Corp. deklaruoja, kad
Lietuvių
[Lithuanian]
šisWL-5450(5460)AP atitinka esminius reikalavimus
ir kitas 1999/5/EB Direktyvos nuostatas.
Česky [Czech]
da
Dansk [Danish]
de
Deutsch
[German]
et
Eesti [Estonian]
en
English
es
Español
[Spanish]
el
Undertegnede OvisLink Corp. erklærer herved, at nl
følgende udstyr WL-5450(5460)APoverholder de Nederlands [Dutch
væsentlige krav og øvrige relevante krav i direktiv
1999/5/EF.
Hierbij verklaart OvisLink Corp. dat het toestel
WL-5450(5460)AP in overeenstemming is met de
essentiële eisen en de andere relevante bepalingen
van richtlijn 1999/5/EG.
Hiermit erklärt OvisLink Corp., dass sich das
mt
Gerät WL-5450(5460)APin Übereinstimmung mit Malti [Maltese]
den grundlegenden Anforderungen und den
übrigen einschlägigen Bestimmungen der
Richtlinie 1999/5/EG befindet.
Hawnhekk, OvisLink Corp, jiddikjara li dan
WL-5450(5460)AP jikkonforma mal-ħtiġijiet
essenzjali u ma provvedimenti oħrajn relevanti li
hemm fid-Dirrettiva 1999/5/EC.
Käesolevaga kinnitab OvisLink Corp. seadme
hu
WL-5450(5460)AP vastavust direktiivi 1999/5/EÜ Magyar
põhinõuetele ja nimetatud direktiivist tulenevatele [Hungarian]
teistele asjakohastele sätetele.
Alulírott, OvisLink Corp nyilatkozom, hogy a
WL-5450(5460)AP megfelel a vonatkozó alapvetõ
követelményeknek és az 1999/5/EC irányelv egyéb
elõírásainak.
Hereby, OvisLink Corp., declares that this
WL-5450(5460)AP is in compliance with the
essential requirements and other relevant
provisions of Directive 1999/5/EC.
Niniejszym OvisLink Corp oświadcza, że
WL-5450(5460)AP jest zgodny z zasadniczymi
wymogami oraz pozostałymi stosownymi
postanowieniami Dyrektywy 1999/5/EC.
pl
Polski [Polish]
Por medio de la presente OvisLink Corp. declara pt
que el WL-5450(5460)APcumple con los
Português
requisitos esenciales y cualesquiera otras
[Portuguese]
disposiciones aplicables o exigibles de la
Directiva 1999/5/CE.
OvisLink Corp declara que este
WL-5450(5460)APestá conforme com os requisitos
essenciais e outras disposições da Directiva
1999/5/CE.
ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ OvisLink Corp. ΔΗΛΩΝΕΙ
OvisLink Corp izjavlja, da je ta WL-5450(5460)AP v
skladu z bistvenimi zahtevami in ostalimi relevantnimi
določili direktive 1999/5/ES.
Ελληνική [Greek] ΟΤΙWL-5450(5460)AP ΣΥΜΜΟΡΦΩΝΕΤΑΙ
ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ
ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ
1999/5/ΕΚ.
sl
Slovensko
[Slovenian]
Par la présente OvisLink Corp. déclare que
OvisLink Corp týmto vyhlasuje, že WL-5450(5460)AP
fr
sk
Français [French] l'appareil WL-5450(5460)AP est conforme aux
Slovensky [Slovak] spĺňa základné požiadavky a všetky príslušné
exigences essentielles et aux autres dispositions
ustanovenia Smernice 1999/5/ES.
pertinentes de la directive 1999/5/CE
it
Italiano [Italian]
Con la presente OvisLink Corp. dichiara che
fi
questo WL-5450(5460)AP è conforme ai requisiti Suomi [Finnish]
essenziali ed alle altre disposizioni pertinenti
stabilite dalla direttiva 1999/5/CE.
Ar šo OvisLink Corp. deklarē, ka
lv
Latviski [Latvian] WL-5450(5460)AP atbilst Direktīvas 1999/5/EK
būtiskajām prasībām un citiem ar to saistītajiem
noteikumiem.
sv
Svenska
[Swedish]
OvisLink Corp vakuuttaa täten että
WL-5450(5460)AP tyyppinen laite on direktiivin
1999/5/EY oleellisten vaatimusten ja sitä koskevien
direktiivin muiden ehtojen mukainen
Hér með lýsir OvisLink Corp yfir því að
Íslenska [Icelandic] WL-5450(5460)AP er í samræmi við grunnkröfur og
aðrar kröfur, sem gerðar eru í tilskipun 1999/5/EC.
Härmed intygar OvisLink Corp. att denna
no
WL-5450(5460)AP står I överensstämmelse med Norsk [Norwegian]
de väsentliga egenskapskrav och övriga
relevanta bestämmelser som framgår av direktiv
1999/5/EG.
OvisLink Corp erklærer herved at utstyret
WL-5450(5460)AP er i samsvar med de
grunnleggende krav og øvrige relevante krav i
direktiv 1999/5/EF.
A copy of the full CE report can be obtained from the following address:
OvisLink Corp.
5F, No.6 Lane 130,
Min-Chuan Rd, Hsin-Tien City,
Taipei, Taiwan, R.O.C.
This equipment may be used in AT, BE, CY, CZ, DK, EE, FI, FR, DE, GR, HU, IE, IT, LV, LT, LU, MT, NL, PL,
PT, SK, SI, ES, SE, GB, IS, LI, NO, CH, BG, RO, TR
This device uses software which is partly or completely licensed under the terms of the GNU General Public License. The author of the
software does not provide any warranty. This does not affect the warranty for the product itself.
To get source codes please contact: OvisLink Corp., 5F, No. 96, Min-Chuan Rd, Hsin-Tien City, Taipei, Taiwan, R.O.C. A fee will be
charged for production and shipment for each copy of the source code.
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU
General Public License is intended to guarantee your freedom to share and change free software--to make sure the
software is free for all its users. This General Public License applies to most of the Free Software Foundation's
software and to any other program whose authors commit to using it. (Some other Free Software Foundation software
is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to
make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that
you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free
programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to
surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the
software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the
rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them
these terms so they know their rights.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you
permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not
accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you
indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying
the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a
license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You
may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible
for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to
patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the
conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to
satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a
consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free
redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you
could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the
section is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest
validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution
system, which is implemented by public license practices. Many people have made generous contributions to the wide
range of software distributed through that system in reliance on consistent application of that system; it is up to the
author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal
permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no
warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to
know that what they have is not the original, so that any problems introduced by others will not reflect on the original
authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors
of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we
have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it
may be distributed under the terms of this General Public License. The "Program", below, refers to any such program
or work, and a "work based on the Program" means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated
into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee
is addressed as "you".
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted
interfaces, the original copyright holder who places the Program under this License may add an explicit geographical
distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus
excluded. In such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to
time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems
or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which
applies to it and "any later version", you have the option of following the terms and conditions either of that version or
of any later version published by the Free Software Foundation. If the Program does not specify a version number of
this License, you may choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different,
write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to
the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of
preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software
generally.
NO WARRANTY
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope.
The act of running the Program is not restricted, and the output from the Program is covered only if its contents
constitute a work based on the Program (independent of having been made by running the Program). Whether that is
true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium,
provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and
disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and
give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection
in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program,
and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all
of
these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any
change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the
Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running
for such interactive use in the most ordinary way, to print or display an announcement including an appropriate
copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may
redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if
the Program itself is interactive but does not normally print such an announcement, your work based on the Program
is not required to print an announcement.)
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED
IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS
IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY
TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve
this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most
effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to
where the full notice is found.
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the
Program, and can be reasonably considered independent and separate works in themselves, then this License, and
its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the
same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the
terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every
part regardless of who wrote it.
one line to give the program's name and an idea of what it does.
Copyright (C) yyyy name of author
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the
intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public
License for more details.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on
the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this
License.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public
License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later
version.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free
Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form
under the terms of Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the
terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than
your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source
code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This
alternative is allowed only for noncommercial distribution and only if you received the program in object code or
executable form with such an offer, in accord with Subsection b above.)
Also add information on how to contact you by electronic and paper mail.
The source code for a work means the preferred form of the work for making modifications to it. For an executable
work, complete source code means all the source code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and installation of the executable. However, as a special
exception, the source code distributed need not include anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs,
unless that component itself accompanies the executable.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright
disclaimer" for the program, if necessary. Here is
a sample; alter the names:
If distribution of executable or object code is made by offering access to copy from a designated place, then offering
equivalent access to copy the source code from the same place counts as distribution of the source code, even
though third parties are not compelled to copy the source along with the object code.
signature of Ty Coon, 1 April 1989
Ty Coon, President of Vice
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License.
Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate
your rights under this License. However, parties who have received copies, or rights, from you under this License will
not have their licenses terminated so long as such parties remain in full compliance.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO
WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain
conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License.
Of course, the commands you use may be called something other than `show w' and `show c'; they could even be
mouse-clicks or menu items--whatever suits your program.
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision'
(which makes passes at compilers) written by James Hacker.
This General Public License does not permit incorporating your program into proprietary programs. If your program is
a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is
what you want to do, use the GNU Lesser General Public License instead of this License.
FCC Certifications
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules.
These limits are designed to provide reasonable protection
against harmful interference in a residential installation.
This equipment generates uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation.
If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment
off and on, the user is encouraged to try to correct the interference by one or more of the
following measures:
y
Reorient or relocate the receiving antenna.
y
Increase the separation between the equipment and receiver.
y
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
y
Consult the dealer or an experienced radio/TV technician for help.
CAUTION:
Any changes or modifications not expressly approved by the grantee of this device could void the
user’s authority to operate the equipment.
This device complies with Part 15 of the FCC rules.
conditions:
Operation is subject to the following two
(1) This device may not cause harmful interference, and (2) This device must accept
any interference received, including interference that may cause undesired operation.
FCC RF Radiation Exposure Statement
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with a minimum distance of 20cm
between the radiator and your body.
CE Mark Warning
This is a Class B product. In a domestic environment, this product may cause radio interference,
in which case the user may be required to take adequate measures.
All trademarks and brand names are the property of their respective proprietors.
Specifications are subject to change without prior notification.
2
WL5460AP v2 User’s Manual
Table of Contents
INTRODUCTION ................................................................................................................................................................ 1
FEATURES........................................................................................................................................................................ 2
PARTS, NAMES, AND FUNCTIONS..................................................................................................................................... 3
FACTORY DEFAULT SETTINGS ......................................................................................................................................... 5
WL-5460AP v2............................................................................................................................................................ 5
HARDWARE CONNECTION ............................................................................................................................................... 6
ABOUT THE WIRELESS OPERATION MODES..................................................................................................................... 7
ACCESS POINT MODE .................................................................................................................................................... 8
CLIENT MODE (INFRASTRUCTURE) ................................................................................................................................ 9
CLIENT MODE (AD-HOC) .............................................................................................................................................. 10
BRIDGE MODE .............................................................................................................................................................. 11
WDS REPEATER MODE ............................................................................................................................................... 12
UNIVERSAL REPEATER MODE ...................................................................................................................................... 13
WISP ( CLIENT ROUTER) MODE .................................................................................................................................. 14
WISP + UNIVERSAL REPEATER MODE ........................................................................................................................ 15
CONFIGURATION ........................................................................................................................................................... 16
MODE ............................................................................................................................................................................ 17
AP MODE SETTING ........................................................................................................................................................ 18
Security.................................................................................................................................................... 19
Advanced Settings..................................................................................................................................................... 23
CLIENT MODE SETTING ................................................................................................................................................. 27
BRIDGE MODE SETTING ................................................................................................................................................ 29
WDS REPEATER MODE SETTING................................................................................................................................... 31
UNIVERSAL REPEATER MODE SETTING ......................................................................................................................... 33
WISP (CLIENT ROUTER) MODE SETTING ...................................................................................................................... 35
WISP + UNIVERSAL REPEATER MODE SETTING............................................................................................................ 38
STATUS ......................................................................................................................................................................... 40
TCP/IP ......................................................................................................................................................................... 43
REBOOT ........................................................................................................................................................................ 45
OTHER .......................................................................................................................................................................... 46
APPENDIX A: EMERGENCY FIRMWARE UPLOAD ......................................................................................................... 49
3
WL5460AP v2 User’s Manual
Introduction
． WL-5460APv2 is world's most popular multi-function access point. It features an impressive total of 7
wireless multi-function modes that are not available in normal access point. In addition, the ACK timeout and
RSSI feature makes it suitable for long distance application. From ordinary AP application to Hotspot and
WISP usage, you will find the WL-5460AP is the device you want.
． WL-5460APv2 is an IEEE802.11b/g compliant 11 Mbps & 54 Mbps Ethernet Wireless Access Point. The
Wireless Access Point is equipped with two 10/100 M Auto-sensing Ethernet ports for connecting to LAN and
also for cascading to next Wireless Access Point.
． WL-5460APv2 provides 64/128bit WEP encryption, WPA-PSK, WPA2-PSK and IEEE802.1x which
ensures a high level of security to protect users’ data and privacy. The MAC Address filter prevents the
unauthorized MAC Addresses from accessing your Wireless LAN. Your network security is therefore double
assured.
The web-based management utility is provided for easy configuration that your wireless network connection
is ensured to be always solid and hassle free.
1
WL5460AP v2 User’s Manual
Features
1.
2x100Mbps LAN ports for Wireless AP cascade.,2MB flash,16MB SDRAM.
2.
18dBm output Power.
3.
AP , Client, Bridge ,WDS Repeater, Universal Repeater mode.
4.
WISP Client Router, WISP+ Universal Repeater mode.
5.
Allows WEP 64/128 bit.
6.
Support WPA-PSK, WPA2-PSK encryption.
7.
Support data rate automatic fallback.
8.
Automatic channel selection.
9.
Allowable channels: 1~11 (USA [FCC]), 1~13 (Europe [ETSI])
10.
Client access control.
11.
Supports 802.1x/Radius client with EAP-TLS, TKIP, AES encryption.
12.
Supports IAPP.
13.
Adjustable Tx power, Tx rate, and SSID broadcast.
14.
ACK Timeout , Watch dog function.
15.
Web interface management.
16.
Support System event log and statistics.
17.
MAC filtering (For wireless only).
2
WL5460AP v2 User’s Manual
Parts, Names, and Functions
1. Front Panel: (LED Indicators) (5460AP / 5460AP v2)
LED
Indicator
1
Power
Status
Color
Solid
Green
Flashing
Turns solid green when power is
N/A.
applied to this device.
2
Status
Red
Turns solid red when the device is
booting, after boot successfully, the
light turn off.
3~6
Link/Act.
Green
Wireless
Turns solid green when connected
Receiving/
and associated to at least a client
Sending data
station.
WEP/WPA
Orange
Turns solid orange when wireless
N/A
security is enabled.
MAC Ctrl
Orange
Turns solid orange when MAC Control N/A
is enabled.
Bridge /
Orange
Wired
LAN 1
Green
LAN 2
N/A
Repeater is enabled.
Repeater
7~8
Turn solid orange when Bridge or
Turns solid green when linked to a
Receiving/
local network.
Sending data
Table 1: LED Indicators
3
WL5460AP v2 User’s Manual
2. Rear Panel: Connection Ports (5460AP / 5460AP v2)
Port/button
Functions
A
12V DC
Connects the power adapter plug
B
LAN1
Connects to Ethernet
C
LAN2
Connects to Ethernet
D
(Factory)
Press over 3 seconds to reboot this device.
RESET
Press for over 10 seconds to restore factory settings.
Performing the Factory Reset will erase all previously entered
device settings.
Table 2: Connection Ports
4
WL5460AP v2 User’s Manual
Factory Default Settings
Setting
Wireless Access Point
Device Name
WL-5460AP v2
SSID
Default value: airlive
Channel
Default value: 13
WEP
Default value: Disabled
IP Address
Default value: 192.168.100. 252
DHCP Server
z
In AP, Client, and Repeater mode, the default DHCP Server is
disabled, Please set your PC's IP to the same subnet as the AP to
access the AP.
z
In WISP mode, the default DHCP server is enabled. Please restart
your PC to renew the IP address.
DHCP Server IP Range
192.168.100.100~192.168.100.200
Table 3: Default Setting
5
WL5460AP v2 User’s Manual
Hardware Connection
Note: Before you starting hardware connection, you are advised to find an appropriate location to place the
Access Point. Usually, the best place for the Access Point is at the center of your wireless network, with line
of straight to all your wireless stations. Also, remember to adjust the antenna; usually the higher the antenna
is placed; the better will be the performance.
1. Connect to your local area network: connect an Ethernet cable to one of the Ethernet port.
2. (LAN1 or LAN2) of this Wireless Access Point, and the other end to a hub, switch, router, or another
wireless access point.
3. Power on the device: connect the included AC power adapter to the Wireless Access Point’s power port
and the other end to a wall outlet.
．Check the LED:
The Power and LAN # LED should be ON. LAN# LED will even blink if there is traffic.
The Link/Act LED will be on in static when associated with a station and blink whenever this AP receives data
packets in the air.
If the Status LED glows after self-test, it means the Wireless Access Point fails on self test. Please ask your
dealer for technical support.
4. Please make sure your computer IP is in the same subnet as the AP (i.e. 192.168.100.x).
5. please make sure your computer has wireless network adapter installed.
6. Open the web browser and enter http://192.168.100.252/.
6
WL5460AP v2 User’s Manual
About the Wireless Operation Modes
The WL-5460AP v2 device provides all 7 modes of wireless operational applications with:
1
2
3
4
5
6
7
Access Point Mode.
Client Mode.
Bridge Mode.
WDS Repeater Mode.
Universal Repeater Mode.
WISP (Client Router) Mode.
WISP + Universal Repeater Mode.
This device is shipped with configuration that is functional right out of the box. If you want to change the
settings in order to perform more advanced configuration or even change the mode of operation, you can use
the web-based utility provided by the manufacturer as described in the following sections.
7
WL5460AP v2 User’s Manual
Access Point Mode
When acting as an access point (default setting), this device connects all the stations (PC/notebook with
wireless network adapter) to a wired network. All stations can have the Internet access if only the Access
Point has the Internet connection. See the sample application below.
To set the operation mode to “Access Point”, please go to “Mode JAP” and click the Setup button.
8
WL5460AP v2 User’s Manual
Client Mode (Infrastructure)
If set to Client (Infrastructure) mode, this device can work like a wireless station when it’s connected to a
computer so that the computer can send packets from wired end to wireless interface.
Refer to the illustration below. This station (AP1 plus the connected computer 1) can associate to another
Access Point (AP2), and then can have the Internet access if the other Access Point (AP2) has the Internet
connection.
To set the operation mode to “Client (Infrastructure)”, Please go to “Mode JClient” and click the Setup
button.
In the “Network Type” field, select as “infrastructure” for configuration.
9
WL5460AP v2 User’s Manual
Client Mode (Ad-hoc)
If set to the Client (Ad-hoc) mode, this device can work like a wireless station when it is connected to a
computer so that the computer can send packets from wired end to wireless interface. You can share files
and printers between wireless stations (PC and laptop with wireless network adapter installed).
See the sample application below.
To set the operation mode to “Client (Ad-Hoc)”, Please go to “Mode JClient” and click the Setup button.
In the “Network Type” field, select as “infrastructure” for configuration.
10
WL5460AP v2 User’s Manual
Bridge Mode
In this mode, 2 access points in two remote locations connect to each other to provide a wireless bridge
between 2 remote LANs. It is mostly used by enterprise to connect 2 remote office's network together. The
bridge modes are connected by using either the WDS (Wireless Distribution System) or Ad-Hoc topology.
This feature is also useful when users want to bridge networks between buildings where it is impossible to
deploy network cable connections between these buildings.
To set the operation mode to “Bridge”, Please go to “Mode JBridge” and click the Setup button for
configuration.
11
WL5460AP v2 User’s Manual
WDS Repeater Mode
A repeater's function is to extend the wireless coverage of another wireless AP or router.
For WDS repeater to work, the remote wireless AP/Router must also support WDS function.
To set the operation mode to “WDS Repeater”, Please go to “Mode JWDS Repeater” and click the Setup
button for configuration.
12
WL5460AP v2 User’s Manual
Universal Repeater Mode
A universal repeater can also extend the wireless coverage of another wireless AP or router. But the
universal repeater does not require the remote device to have WDS function. Therefore, it can work with
almost any wireless device.
Note: When you are using the universal repeater mode, please make sure the remote AP/Router‘s WDS
function is turned off.
To set the operation mode to “Universal Repeater”, Please go to “Mode JUniversal Repeater” and click
the Setup button for configuration.
13
WL5460AP v2 User’s Manual
WISP ( Client Router) Mode
WISP (Client Router) mode
In WISP mode, the AP will behave just the same as the Client mode for wireless function. However, Router
functions are added between the wireless WAN side and the Ethernet LAN side. Therefore, The WISP
subscriber can share the WISP connection without the need for extra router.
To set the operation mode to “WISP”, Please go to “Mode JWISP” and click the Setup button for
configuration.
14
WL5460AP v2 User’s Manual
WISP + Universal Repeater Mode
In this mode, the AP behaves virtually the same as the WISP mode, except one thing: the AP can also send
wireless signal to the LAN side. That means the AP can connect with the remote WISP AP and the indoor
wireless card, and then provide IP sharing capability all at the same time! However, the output power is
divided between 2 wireless sides and proper antenna installation can influence the performance greatly.
To set the operation mode to “WISP + Universal Repeater”, Please go to “Mode JWISP + Universal
Repeater” and click the Setup button for configuration.
15
WL5460AP v2 User’s Manual
Configuration
1.
Start your computer. Connect an Ethernet cable between your computer and the Wireless Access Point.
2.
Make sure your wired station is set to the same subnet as the Wireless Access Point, i.e. 192.168.100.X
3.
Start your WEB browser. In the Address box, enter the following:
http://192.168.100.252/
The configuration menu is divided into five categories:
Mode, Status, TCP/IP, Reboot and Other.
Click on the desired setup item to expand the page in the main navigation page. The setup pages
covered in this utility are described below.
16
WL5460AP v2 User’s Manual
Mode
You can choose and setup different wireless mode for detail configurations
Wireless Mode
AP
Select the AP and press Setup button for Wireless AP mode configuration.
Client
Select the Client and press Setup button for Wireless Client mode
configuration.
Bridge
Select the Bridge and press Setup button for Wireless Bridge mode
configuration.
WDS Repeater
Select the WDS Repeater and press Setup button for Wireless WDS Repeater
mode configuration.
Universal Repeater
Select the Universal Repeater and press Setup button for Wireless Universal
repeater mode configuration.
WISP
Select the WISP and press Setup button for WISP (Client Router) mode
configuration.
WISP + Universal
Select the WISP + Universal Repeater and press Setup button for WISP
Repeater
+ Universal Repeater mode configuration.
17
WL5460AP v2 User’s Manual
AP Mode Setting
Alias Name
You can set the alias name for this device. Limited not exceed 32 characters.
Disable Wireless
Check the box to disable the Wireless LAN Interface, by so doing; you won’t be able
LAN Interface
to make wireless connection with this Access Point in your located network. In other
words, this device will not be visible by any wireless station.
Band
You can choose one mode of the following you need.
~ 2.4GHz (B): 802.11b supported rate only.
~ 2.4GHz (G): 802.11g supported rate only.
~ 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate. The default
is 2.4GHz (B+G) mode.
SSID
The SSID differentiates one WLAN from another; therefore, all access points and all
devices attempting to connect to a specific WLAN must use the same SSID. It is
case-sensitive and must not exceed 32 characters. A device will not be permitted
to join the BSS unless it can provide the unique SSID. An SSID is also referred to as
a network name because essentially it is a name that identifies a wireless network.
The default SSID is airlive.
Channel Number
Allow user to set the channel manually or automatically.
If set channel manually, just select the channel you want to specify.
If “Auto” is selected, user can set the channel range to have Wireless Access Point
automatically survey and choose the channel with best situation for communication.
The number of channels supported depends on the region of this Access Point. All
stations communicating with the Access Point must use the same channel.
The default channel is 13.
18
WL5460AP v2 User’s Manual
Wireless
Client Allow user to set the function Enabled or Disabled.
Isolation
By the function, all wireless clients can't mutual link, but wireless client still link with
LAN port adapter.
The default value is Disabled.
Security
Press the setup button for detail configurations
To provide a certain level of security, the IEEE 802.11 standard has defined two types of authentication
methods: Open System or Shared Key. And WL-5460APv2 also support other wireless authentication and
encryption methods for enhance your wireless network.
With Open System authentication, a wireless PC can join any network and receive any messages that are
not encrypted. With Shared Key authentication, only those PCs that possess the correct authentication key
can join the network. By default, IEEE 802.11 wireless devices operate in an Open System network and
None data encryption. If you want secure your wireless network, you need to setup wireless security related
function to enable security network.
None
Encryption: None (Encryption is set to None by default.)
If the Access Point is using Encryption None, then the wireless adapter will need to be set to the same
authentication mode.
WEP
Encryption: WEP
If selected WEP encryption, you must set WEP key value:
19
WL5460AP v2 User’s Manual
Encryption
WEP
Authentication Type
You can select Open System or Shared Key type for authentication.
Key Length
You can set 64bit or 128bit Encryption.
Key Format
Select ASCII if you are using ASCII characters (case-sensitive).
Select HEX if you are using hexadecimal numbers (0-9, or A-F).
Default TX Key
You can enter 4 different Encryption Key and select one key to use as default.
10 hexadecimal digits or 5 ASCII characters are needed if 64-bit WEP is used;
26 hexadecimal digits or 13 ASCII characters are needed if 128-bit WEP is used.
Shared Key is used when both the sender and the recipient share a secret key. So you can choose Open
system, or one Shared Key authentication method.
WPA-PSK
Encryption: WPA-PSK (TKIP) or WPA-PSK (AES)
Wi-Fi Protected Access (WPA) with Pre-Shared Key (PSK) provides better security than WEP keys. It does
not require a RADIUS server in order to provide association authentication, but you do have to enter a shared
key for the authentication purpose. The encryption key is generated automatically and dynamically.
20
WL5460AP v2 User’s Manual
Encryption
You can select WPA-PSK (TKIP) or WPA-PSK (AES) method for data
encryption.
Pre-shared Key
There are two formats for choice to set the Pre-shared key, i.e. Passphrase and
Hex. If Hex is selected, users will have to enter a 64 characters string. For easier
configuration, the Passphrase (at least 8 characters) format is recommended.
Group Key Life Time
Enter the number of seconds that will elapse before the group key change
automatically. The default is 86400 seconds.
WPA2-PSK
Encryption: WPA2-PSK (AES) or WPA-PSK Mixed
WPA2-PSK authentication method is almost like WPA-PSK, You can choose the Pre-Shared Key format and
enter the Pre-shared key,
21
WL5460AP v2 User’s Manual
Encryption
You can select WPA2-PSK (AES) or WPA2-PSK Mixed method for data
encryption
Pre-shared Key
There are two formats for choice to set the Pre-shared key, i.e. Passphrase and
Hex. If Hex is selected, users will have to enter a 64 characters string. For easier
configuration, the Passphrase (at least 8 characters) format is recommended.
Group Key Life Time
Enter the number of seconds that will elapse before the group key change
automatically. The default is 86400 seconds.
802.1x / RADIUS
Encryption: 802.1x / RADIUS
security
You can select None, WEP, WPA (TKIP), WPA (AES), WPA2 (AES), WPA2
Mixed method for data encryption.
Encryption: None
No data encryption and Use 802.1x Authentication is disable.
Encryption: WEP
802.1x Authentication is enabled and the RADIUS Server will proceed to check the 802.1x Authentication,
and make the RADIUS server to issue the WEP key dynamically.
You can select WEP 64bits or WEP 128bits for data encryption.
Encryption: WPA (TKIP) / WPA (AES)
WPA-RADIUS authentication use WPA (Wi-Fi Protect Access) data encryption for 802.1x authentication.
22
WL5460AP v2 User’s Manual
WPA is an encryption standard proposed by WiFi for advance protection by utilizing a password key (TKIP)
or certificate. It is more secure than WEP encryption.
Encryption: WPA2-AES / WPA2-Mixed
The two most important features beyond WPA to become standardized through 802.11i/WPA2 are:
pre-authentication, which enables secure fast roaming without noticeable signal latency. Pre-authentication
provides a way to establish a PMK security association before a client associates. The advantage is that the
client reduces the time that it's disconnected to the network.
Authentication RADIUS
Enter the RADIUS Server IP address and Password provided by your ISP.
Server
Port: Enter the RADIUS Server’s port number provided by your ISP. The default
is 1812.
IP Address: Enter the RADIUS Server’s IP Address provided by your ISP.
Password: Enter the password that the AP shares with the RADIUS Server.
Accounting RADIUS
Enter the Accounting RADIUS Server IP address and Password provided by your
Server
ISP
Advanced Settings
Press the setup button for detail configurations
It is not recommended that settings in this page to be changed unless advanced users want to change to
meet their wireless environment for optimal performance.
Fragment Threshold
Fragmentation mechanism is used for improving the efficiency
when high traffic flows along in the wireless network. If your
802.11g Wireless LAN PC Card often transmit large files in wireless
23
WL5460AP v2 User’s Manual
network, you can enter new Fragment Threshold value to split the
packet.
The value can be set from 256 to 2346. The default value
is 2346.
RTS Threshold
RTS Threshold is a mechanism implemented to prevent the “Hidden Node”
problem. “Hidden Node” is a situation in which two stations are within range of
the same Access Point, but are not within range of each other. Therefore, they
are hidden nodes for each other. When a station starts data transmission with
the Access Point, it might not notice that the other station is already using the
wireless medium. When these two stations send data at the same time, they
might collide when arriving simultaneously at the Access Point. The collision
will most certainly result in a loss of messages for both stations.
Thus, the RTS Threshold mechanism provides a solution to prevent data
collisions. When you enable RTS Threshold on a suspect “hidden
station”, this station and its Access Point will use a Request to Send
(RTS). The station will send an RTS to the Access Point, informing
that it is going to transmit the data. Upon receipt, the Access Point
will respond with a CTS message to all station within its range to
notify all other stations to defer transmission. It will also confirm the
requestor station that the Access Point has reserved it for the
time-frame of the requested transmission.
If the “Hidden Node” problem is an issue, please specify the packet size. The
RTS mechanism will be activated if the data size exceeds the value you set..
The default value is 2347.
Warning: Enabling RTS Threshold will cause redundant network overhead
that could negatively affect the throughput performance instead of providing
a remedy.
This value should remain at its default setting of 2347. Should you encounter
inconsistent data flow, only minor modifications of this value are
recommended.
Beacon Interval
Beacon Interval is the amount of time between beacon transmissions. Before
a station enters power save mode, the station needs the beacon interval to
know when to wake up to receive the beacon (and learn whether there are
buffered frames at the access point).
Data Rate
By default, the unit adaptively selects the highest possible rate for
transmission. Select the basic rates to be used among the following options:
Auto, 1, 2, 5.5, 11or 54 Mbps. For most networks the default setting is Auto
which is the best choice. When Auto is enabled the transmission rate will
24
WL5460AP v2 User’s Manual
select the optimal rate. If obstacles or interference are present, the system will
automatically fall back to a lower rate.
Preamble Type
A preamble is a signal used in wireless environment to synchronize the
transmitting timing including Synchronization and Start frame delimiter. In a
"noisy" network environment, the Preamble Type should be set to Long
Preamble. The Short Preamble is intended for applications where minimum
overhead and maximum performance is desired. If in a "noisy" network
environment, the performance will be decreased.
Broadcast SSID
Select enabled to allow all the wireless stations to detect the SSID of this
Access Point.
IAPP
IAPP (Inter Access Point Protocol) is designed for the enforcement of unique
association throughout a ESS (Extended Service Set) and a secure exchange
of station’s security context between current access point (AP) and new AP
during handoff period.
802.11g Protection
The 802.11g standard includes a protection mechanism to ensure mixed 802.11b and
802.11g operation. If there is no such kind of mechanism exists, the two kinds of
standards may mutually interfere and decrease network’s performance.
TX Power Level
For countries that impose limit on WLAN output power, it might be necessary
to reduce TX (transmit) power. There are 7 TX Power Levels to choose
from — select a level to make sure that the output power measured at the
antenna end will not exceed the legal limit in your country.
Enable Watch dog
Check and enable this watch dog function
Watch Interval
Setup the interval time for watch dog function between 1 to 60 mins
Watch Host
Enter the watch dog host ip address .
ACK Timeout
When a packet is sent out from one wireless station to the other, it will waits
for an Acknowledgement frame from the remote station. If the ACK is NOT
received within that timeout period then the packet will be re-transmitted
resulting in reduced throughput. If the ACK setting is too high then
throughput will be lost due to waiting for the ACK Window to timeout on lost
packets. By having the ability to adjust the ACK setting we can effectively
optimize the throughput over long distance links. This is especially true for
802.11a and 802.11g networks
You can set as default for auto adjustment.
Apply Change
Press to save the new settings on the screen.
Reset
Press to discard the data you have entered since last time you press Apply
Change.
Access Control
Press the setup button for detail configurations
25
WL5460AP v2 User’s Manual
When Enable Wireless Access Control is checked, only those clients whose wireless MAC addresses
listed in the access control list can access this Access Point. If the list contains no entries with this function
being enabled, then no clients will be able to access this Access Point.
Wireless Access Control Select the Access Control Mode from the pull-down menu.
Mode
Disable: Select to disable Wireless Access Control Mode.
Allow Listed: Only the stations shown in the table can associate with the AP.
Deny Listed: Stations shown in the table won’t be able to associate with the AP.
MAC Address
Enter the MAC Address of a station that is allowed to access this Access Point.
Comment
You may enter up to 20 characters as a remark to the previous MAC Address.
Apply Changes
Press to save the new settings on the screen.
Reset
Press to discard the data you have entered since last time you press Apply
Change.
Delete Selected
To delete clients from access to this Access Point, you may firstly check the
Select checkbox next to the MAC address and Comments, and press Delete
Selected.
Delete All
To delete all the clients from access to this Access Point, just press Delete All
without selecting the checkbox.
Reset
If you have made any selection, press Reset will clear all the select mark.
26
WL5460AP v2 User’s Manual
Client Mode Setting
Alias Name
You can set the alias name for this device. limited not exceed 32 characters.
Disable Wireless
Check the box to disable the Wireless LAN Interface, by so doing, you won’t be
LAN Interface
able to make wireless connection with this Access Point in the network you are
located. In other words, this device will not be visible by any wireless station.
Band
You can choose one mode of the following you need.
~ 2.4GHz (B): 802.11b supported rate only.
~ 2.4GHz (G): 802.11g supported rate only.
~ 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate. The
default is 2.4GHz (B+G) mode.
Network Type
Client mode have two Network type :
Infrastructure
A wireless network that is built around one or more access points, providing
wireless clients access to wired LAN or Internet service. It is the most popular
WLAN network structure today.
AdHoc wireless network do not use wireless AP orrouter as the central hub of the
network. Instead, wireless client are connected directly to each other.
SSID
The SSID differentiates one WLAN from another; therefore, all access points and
all devices attempting to connect to a specific WLAN must use the same SSID. It is
case-sensitive and must not exceed 32 characters. A device will not be permitted
to join the BSS unless it can provide the unique SSID. An SSID is also referred to
27
WL5460AP v2 User’s Manual
as a network name because essentially it is a name that identifies a wireless
network.
Site Survey
Site survey displays all the active Access Points and IBSS in the neighborhood.
You can select one AP to associate. Press Site Survey button to search the
wireless device that this client want to connect.
Channel Number
Allow user to set the channel manually or automatically.
If set channel manually, just select the channel you want to specify.
If “Auto” is selected, user can set the channel range to have Wireless Access Point
automatically
survey
and
choose
the
channel
with
best
situation
for
communication. All stations communicating with the Access Point must use the
same channel.
when setup infrastructure of Client mode, the channel number can not
Be changed. You have to go to AP mode to change the channel number
Auto MAC Clone
Check the box to enable MAC Clone for Single Ethernet Client.
Manual MAC Clone
Enter the MAC Address of Single Ethernet Client.
Address
Security
Please refer the AP mode settingsÆ Security for details.
In client mode are not supported with RADIUS 802.1x authentication.
Advance Setting
Please refer the AP mode settingsÆ Advance Setting for details.
28
WL5460AP v2 User’s Manual
Bridge Mode Setting
You can set the alias name for this device. limited not exceed 32 characters.
Alias Name
Disable
Wireless Check the box to disable the Wireless LAN Interface, by so doing, you won’t be
LAN Interface
able to make wireless connection with this Access Point in the network you are
located. In other words, this device will not be visible by any wireless station.
Band
You can choose one mode of the following you need.
~ 2.4GHz (B): 802.11b supported rate only.
~ 2.4GHz (G): 802.11g supported rate only.
~ 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate. The
default is 2.4GHz (B+G) mode.
Channel Number
In Bridge mode, both wireless AP/Router device need set to the same Channel
number.
Security
Please refer the AP mode settingsÆ Security for details.
But bridge mode are not supported with RADIUS 802.1x authentication.
WDS Security
To enable security between wireless AP/Router , you can select WEP 64bits, WEP
128bits, WPA (TKIP), WPA2(AES) for data encryption.
For WEP encryption, Select ASCII if you are using ASCII characters. Select HEX if
you are using hexadecimal numbers (0-9, or A-F).
For WPA/WPA2 encryption, you need enter the Pre-Shared Key Information for
the authentication purpose.
29
WL5460AP v2 User’s Manual
Advance Setting
Please refer the AP mode settingsÆ Advance Setting for details.
AP MAC address
Enter 12 digits in hex numbers in the AP MAC address (BSSID) field and press the
Add MAC Address Button to associate with other’s Wireless access point.
Before you want to use bridge mode to connect each other to provide
A wireless bridge between 2 remote LANs, you need add the BSSID of other’s
wireless AP first.
Site Survey
Site survey displays all the active Access Points and IBSS in the neighborhood.
Press Site Survey button to search the wireless device.
Add MAC Address
Enter MAC address of remote access point.
Reset
Press to discard the data you have entered since last time you press Apply
Change.
Show Statistics
List all packets information of traffic.
Delete Selected
To delete bridge from access to this Access Point, you may firstly check the Select
checkbox next to the MAC address and Comments, and press Delete Selected.
Delete All
To delete all the clients from access to this Access Point, just press Delete All
without selecting the checkbox.
30
WL5460AP v2 User’s Manual
WDS Repeater Mode Setting
You can set the alias name for this device. limited not exceed 32 characters.
Alias Name
Disable
Wireless Check the box to disable the Wireless LAN Interface, by so doing, you won’t be
LAN Interface
able to make wireless connection with this Access Point in the network you are
located. In other words, this device will not be visible by any wireless station.
Band
You can choose one mode of the following you need.
~ 2.4GHz (B): 802.11b supported rate only.
~ 2.4GHz (G): 802.11g supported rate only.
~ 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate. The
default is 2.4GHz (B+G) mode.
SSID
The SSID differentiates one WLAN from another; therefore, all access points and
all devices attempting to connect to a specific WLAN must use the same SSID. It
is case-sensitive and must not exceed 32 characters.
A device will not be
permitted to join the BSS unless it can provide the unique SSID. An SSID is also
referred to as a network name because essentially it is a name that identifies a
wireless network
Channel Number
The number of channels supported depends on the region of this Access Point. All
stations communicating with the Access Point must use the same channel.
Wireless Client
When enabled, the wireless clients are separated from each other. Please refer
Isolation
the AP mode settingsÆ Wireless Client Isolation for details.
31
WL5460AP v2 User’s Manual
Security
Please refer the AP mode settingsÆ Security for details,
This setting is use between Wireless client and this device.
WDS Security
Please refer to the Bridge mode settings Æ WDS Security for details
This setting is use between both wireless AP/Router devices.
Advance Setting
Please refer the AP mode settingsÆ Advance Setting for details.
Access Control
Please refer the AP mode setting Æ Access Control for details.
AP MAC Address
Enter 12 digits in hex numbers in the AP MAC address (BSSID) field and press the
Add MAC Address Button to associate with other’s Wireless access point.
Before you want to use bridge mode to connect each other to provide
A wireless bridge between 2 remote LANs, you need add the BSSID of other’s
wireless AP first.
Delete Selected
To delete bridge from access to this Access Point, you may firstly check the Select
checkbox next to the MAC address and Comments, and press Delete Selected.
Delete All
To delete all the clients from access to this Access Point, just press Delete All
without selecting the checkbox.
32
WL5460AP v2 User’s Manual
Universal Repeater Mode Setting
You can set the alias name for this device. limited not exceed 32 characters.
Alias Name
Disable
Wireless Check the box to disable the Wireless LAN Interface, by so doing, you won’t be
LAN Interface
able to make wireless connection with this Access Point in the network you are
located. In other words, this device will not be visible by any wireless station.
Band
You can choose one mode of the following you need.
~ 2.4GHz (B): 802.11b supported rate only.
~ 2.4GHz (G): 802.11g supported rate only.
~ 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate. The default
is 2.4GHz (B+G) mode.
SSID
The SSID differentiates one WLAN from another; therefore, all access points and
all devices attempting to connect to a specific WLAN must use the same SSID. It is
case-sensitive and must not exceed 32 characters. A device will not be permitted
to join the BSS unless it can provide the unique SSID. An SSID is also referred to
as a network name because essentially it is a name that identifies a wireless
network
Channel Number
The number of channels supported depends on the region of this Access Point. All
stations communicating with the Access Point must use the same channel.
SSID of extended
When in Universal Repeater mode, you have to enter the ESSID of other’s
Interface
AP/Router that device want to connect.
The device SSID and the SSID of extended interface can be the same or different.
33
WL5460AP v2 User’s Manual
When you are using the universal repeater mode, please make sure the remote
AP/Router WDS function is turned off.
Site Survey
Please refer the Bridge mode settingsÆ Site Survey for details.
Security
Please refer the AP mode settingsÆ Security for details,
This setting used Wireless client or remote AP to link this device.
Advance Setting
Please refer the AP mode settingsÆ Advance Setting for details.
Access Control
Please refer the AP mode setting Æ Access Control for details.
34
WL5460AP v2 User’s Manual
WISP (Client Router) Mode Setting
You can set the alias name for this device. limited not exceed 32
Alias Name
characters
Disable
Wireless Check the box to disable the Wireless LAN Interface, by so doing, you won’t be
LAN Interface
able to make wireless connection with this Access Point in the network you are
located. In other words, this device will not be visible by any wireless station.
Band
You can choose one mode of the following you need.
~ 2.4GHz (B): 802.11b supported rate only.
~ 2.4GHz (G): 802.11g supported rate only.
~ 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate. The
default is 2.4GHz (B+G) mode.
SSID
The SSID differentiates one WLAN from another; therefore, all access points and
all devices attempting to connect to a specific WLAN must use the same SSID. In
WISP mode, you have to enter the WISP Outdoor AP
SSID manually or click the “site survey” button to connect and get
SSID automatically.
Site Survey
Please refer the Client mode settingsÆ Site Survey for details.
MAC Clone Address
Enter the MAC Address of Single Ethernet Client.
Security
Please refer the AP mode settingsÆ Security Survey for details.
Not supported with RADIUS 802.1x authentication.
35
WL5460AP v2 User’s Manual
Advance Setting
Please refer the AP mode settingsÆ Advance Setting for details.
WAN port
You can select many WAN Access Type : Static IP , DHCP Client, PPPOE,
PPTP, and L2TP for WAN connection depend on you WISP provided.
Virtual Server
In WISP mode, you can setup and enable Virtual server function. Like Web, FTP,
Email, DNS, Telnet server.
Select one virtual server type and enter the Local IP address, Local Port Range
and click the save button.
Special Application
You can enable some system default special application, like Qucktime 4
36
WL5460AP v2 User’s Manual
Audio/Video application, Dialpad internet phone service. or define the special
application manually, select the incoming type (TCP/UDP) Incoming start ~ End
port ,Trigger Start ~ End port. Select the Trigger Type.
DMZ
Enable DMZ and enter the DMZ Host IP address.
Remote Management
Enable the function that setting configuration from Internet.
37
WL5460AP v2 User’s Manual
WISP + Universal Repeater Mode Setting
You can set the alias name for this device. limited not exceed 32
Alias Name
characters
Disable
Wireless Check the box to disable the Wireless LAN Interface, by so doing, you won’t be
LAN Interface
able to make wireless connection with this Access Point in the network you are
located. In other words, this device will not be visible by any wireless station.
Band
You can choose one mode of the following you need.
~ 2.4GHz (B): 802.11b supported rate only.
~ 2.4GHz (G): 802.11g supported rate only.
~ 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate. The
default is 2.4GHz (B+G) mode.
SSID
The SSID differentiates one WLAN from another; therefore, all access points and
all devices attempting to connect to a specific WLAN must use the same SSID. In
WISP mode, you have to enter the WISP Outdoor AP
SSID manually or click the “site survey” button to connect and get
SSID automatically.
Site Survey
Please refer the Client mode settingsÆ Site Survey for details.
SSID of extended
Please refer the Universal repeater mode settingsÆ SSID of extended Interface
Interface
for details.
MAC Clone Address
Enter the MAC Address of Single Ethernet Client.
38
WL5460AP v2 User’s Manual
Enable Encryption On
You can designate security to use for WLAN side, WAN side or both sides.
Both WAN and WLAN side: The security is used on both the WISP and the
Wireless Client(PC side) connection..
WLAN side only: The security used on wireless client connection only. The
WISP side is not encrypted.
WAN side only: The security used on WISP connection only. The WLAN side is
not encrypted..
Security
Please refer the AP mode settingsÆ Security Survey for details.
Not supported with RADIUS 802.1x authentication.
Advance Setting
Please refer the AP mode settingsÆ Advance Setting for details.
WAN port
Please refer the WISP mode settingsÆ WAN port Setting for details.
Virtual Server
Please refer the WISP mode settingsÆ Virtual Server Setting for details.
Special Application
Please refer the WISP mode settingsÆ Special Application Setting for details.
DMZ
Please refer the WISP mode settingsÆ DMZ Setting for details.
Remote Management Please refer the WISP mode settingsÆ Remote Management Setting for details.
39
WL5460AP v2 User’s Manual
Status
In this screen, you can see the current settings and status of this Access Point. You can change settings by
selecting specific tab described in below.
． System
System
40
WL5460AP v2 User’s Manual
Uptime
The time period since the device was up.
Firmware Version
The current version of the firmware installed in this device.
Wireless
Mode
There are 7 modes supported, The default mode is Access Point. If you want to
change to other mode, please click the Mode and select the wireless mode you
want.
Physical Address
Display wireless MAC address information.
Band
Display wireless band type information.
SSID
Display the SSID of this device.
Channel Number
The number of channels supported depends on the region of this Access Point. All
stations communicating with the Access Point must use the same channel.
Encryption
Display encryption setting information.
Associated Clients
Displays the total number of clients associated to this AP. You can have up to 64
clients to associate to this Access Point.
BSSID
BSSID displays the ID of current BSS, which uniquely identifies each BSS. In AP
mode, this value is the MAC address of this Access Point.
LAN Configuration (TCP/IP)
Connection Method:
Display the connection method, you can setup in TCP/IP section
Physical Address:
Display the LAN MAC address
IP Address:
Display the LAN IP address, you can setup in TCP/IP section
Network Mask:
Display the network mask, you can setup in TCP/IP section
Default Gateway:
Display the default gateway ip , you can setup in TCP/IP section
DHCP Server:
Default the DHCP Server is enabled(ON)
DHCP
Start
IP Display the DHCP server start IP address.
Finish
IP Display the DHCP server finish IP address.
Address:
DHCP
Address:
Internet Configuration
Connection Method:
Display the internet connection method, you can setup in WISP modeÆWAN
Port configuration
Physical Address:
Display the AP MAC address information
IP Address:
Display the internet IP Address, you can setup in WISP modeÆWAN
Port configuration
Network Mask:
Display the network mask, you can setup in WISP modeÆWAN
Port configuration
Default Gateway:
Display the default gateway , you can setup in WISP modeÆWAN
Port configuration
41
WL5460AP v2 User’s Manual
． Statistics
The Statistics table shows the packets sent/received over wireless and ethernet LAN respectively.
． Active Clients
Display the active Wireless Clients information, include wireless MAC address, TX/Rx Packet, TX Rate, and
Power Saving information.
42
WL5460AP v2 User’s Manual
TCP/IP
In this page, you can change the TCP/IP settings of this Access Point, select to enable/disable the DHCP
Client, 802.1d Spanning Tree, and Clone MAC Address.
IP Address
This field can be modified only when DHCP Client is disabled. If your system
manager assigned you static IP settings, then you will have to enter the
information provided.
Subnet Mask
Enter the information provided by your system manager.
Default Gateway
Enter the information provided by your system manager.
DHCP
Select Disable, Client or Server from the pull-down menu.
Disable: Select to disable DHCP server function.
Client: Select to automatically get the LAN port IP address from ISP (For
ADSL/Cable Modem).
Server: Select to enable DHCP server function.
DHCP Client Range
WL-5060AP IP addresses continuing from 192.168.100.1 to 192.168.100.253
Show Client
Click to show Active DHCP Client table.
DNS Server
Enter the Domain Name Service IP address.
802.1d Spanning Tree
To enable 802.1d Spanning Tree will prevent the network from infinite loops.
Infinite loop will happen in the network when WDS is enabled and there are
multiple active paths between stations.
43
WL5460AP v2 User’s Manual
Clone MAC Address
You can specify the MAC address of your Access Point to replace the factory
setting.
44
WL5460AP v2 User’s Manual
Reboot
Click the Reboot button to restart device.
45
WL5460AP v2 User’s Manual
Other
． Upgrade Firmware
1. Download the latest firmware from your distributor and save the file on the hard drive.
2. Start the browser, open the configuration page, click on Other, and click Upgrade Firmware to
enter the Upgrade Firmware window.
3. Enter the new firmware’s path and file name (i.e. C:\FIRMWARE\firmware.bin) or click the Browse
button to find and open the firmware file (the browser will display to correct file path).
4. Click Upload button to start the upgrade function or Reset button to clear all the settings on this
page.
If firmware upgrade fail, please see Appendix A.
． Save / Reload Settings
This function enables users to save the current configuration as a file (i.e. config.dat) or loades
configuration from a file. Enter the file name or click Browse… to find the file from your computer.
Save Settings to File: Click SAVE.. to save the current configuration to file.
Load Settings From File: Click Browse… if you want to load a pre-saved file, enter the file name
with the correct path and then click on Upload or click Browse… to select the file.
46
WL5460AP v2 User’s Manual
Reset Settings to Default: Click Reset button to restore the default configuration.
． Password
For secure reason, It is recommended that you set the account to access the web server of this Access Point.
Leaving the password blank will disable the protection. The login screen prompts immediately once you finish
setting password. Remember your password for you will be asked to enter them every time you access the
web server of this Access Point.
New Password
Set your new password. Password can be up to 30 characters long. Password
can contain letter, number and space. It is case sensitive.
Confirm Password
Re-enter the new password for confirmation.
Note: when you setup the password and click the apply change button, system will pop-up Window and ask
the username and password, Please enter system default username “admin” (not changeable) and your
password for entering the configuration WEB UI.
． Log
47
WL5460AP v2 User’s Manual
This function can list all log information about device.
Enable Log
Enabled or Disabled display system log information.
System All
List system all log information.
Wireless Only
List wireless log information only.
Refresh
Refresh log information.
Clear
Clear all information in window.
． NTP
This function can setting system time from local computer or Internet.
Current Time
Setting system time
Enable NTP client update Enable or Disable setting system from Internet NTP Server.
Time Zone Select
Select system time zone.
NTP Server
Select NTP Server by Server list or manual inputing.
Save
Save configurayion to flsh.
Reset
Reset system time configurayion.
Refresh
Refresh system time information.
48
WL5460AP v2 User’s Manual
Appendix A: Emergency Firmware Upload
． Using AirLive WL-5460AP's Emergency Firmware Upload Feature
z
The
emergency firmware upload feature is to help you restore the AP when the firmware is corrupted. If
you can no longer access the AP's web UI, please first try to restore-to-default by holding the Reset
button for more than 5 seconds. Then you should be able to find the AP at 192.168.100.252. But if
this still doesn't work, please follow the procedures below to restore the firmware.
1.
Hold the "Reset" button in the back of the AP BEFORE plugging in the power.
2
1
2.
After plug-in the power, wait until the "Status" LED goes off before releasing the reset button.
3.
Visit www.airlive.com. Go to Support->Firmware Download section. Download the WL-5460AP e10
firmware. Decompress the archive file into your PC.
4.
Set your computer's IP address to 192.168.1.100. Open your browser and enter "192.168.1.6".
5.
You should see the emergency upload page. Upload the WL-5460AP e10 firmware (or later) to the AP.
6.
Wait for 3 minutes. Change your PC's IP to 192.168.100.100. You should be able to access the AP at
192.168.100.252.
49
WL5460AP v2 User’s Manual